Skype 7.2.x / 7.35.x / 7.36.x < 7.37 MSFTEDIT.DLL RDP Session Clipboard Handling RCE

Medium Nessus Plugin ID 101084


An instant messaging application installed on the remote Windows host is affected by a remote code execution vulnerability.


The version of Skype installed on the remote Windows host is 7.2.x, 7.35.x, or 7.36.x prior to 7.37. It is, therefore, affected by a stack buffer overflow condition in MSFTEDIT.DLL due to improper validation of images taken from the RDP session clipboard and which are pasted into the Skype message field when doing screen captures from an RDP client. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or potentially the execution of arbitrary code.


Upgrade to Skype version 7.37 or later.

See Also

Plugin Details

Severity: Medium

ID: 101084

File Name: skype_7_37_0_103_creds.nasl

Version: $Revision: 1.2 $

Type: local

Agent: windows

Family: Windows

Published: 2017/06/28

Modified: 2017/08/15

Dependencies: 101085

Risk Information

Risk Factor: Medium


Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:skype:skype

Required KB Items: installed_sw/Skype

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2017/06/08

Vulnerability Publication Date: 2017/06/26

Reference Information

CVE: CVE-2017-9948

BID: 99281

OSVDB: 159859